<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">IR</journal-id>
<journal-title-group>
<journal-title>Information Research</journal-title>
</journal-title-group>
<issn pub-type="epub">1368-1613</issn>
<publisher>
<publisher-name>University of Bor&#x00E5;s</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">ir30iConf47149</article-id>
<article-id pub-id-type="doi">10.47989/ir30iConf47149</article-id>
<article-categories>
<subj-group xml:lang="en">
<subject>Research article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>The challenges of cross-organizational patient data sharing in medical consortium: a study within the context of two-way referral systems</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author"><name><surname>Zhou</surname><given-names>Lihong</given-names></name>
<xref ref-type="aff" rid="aff0001"/></contrib>
<contrib contrib-type="author"><name><surname>Miao</surname><given-names>Hanyu</given-names></name>
<xref ref-type="aff" rid="aff0002"/></contrib>
<contrib contrib-type="author"><name><surname>Tu</surname><given-names>Ruiyang</given-names></name>
<xref ref-type="aff" rid="aff0003"/></contrib>
<contrib contrib-type="author"><name><surname>Hu</surname><given-names>Jiangfeng</given-names></name>
<xref ref-type="aff" rid="aff0004"/></contrib>
<aff id="aff0001"><bold>Lihong Zhou</bold> is a Professor in School of Information Management, Wuhan University, Hubei, China. He received his Ph.D. from the University of Sheffield and his research interests are in library management and data sharing. He can be contacted at <email xlink:href="L.zhou@whu.edu.cn">L.zhou@whu.edu.cn</email></aff>
<aff id="aff0002"><bold>Hanyu Miao</bold> is currently pursuing a master&#x2019;s degree in Library Science at School of Information Management, Wuhan University, Wuhan, China. Her research interests are in library management and data sharing. She can be contacted at <email xlink:href="Miaohyeah@163.com">Miaohyeah@163.com</email></aff>
<aff id="aff0003"><bold>Ruiyang Tu</bold> received his master&#x2019;s degree from School of Information Management, Wuhan University, Wuhan, China. His research interest is in data sharing. He can be contacted at <email xlink:href="trysim@whu.edu.cn">trysim@whu.edu.cn</email></aff>
<aff id="aff0004"><bold>Jiangfeng Hu</bold> is a Ph.D. student in School of Information Management, Wuhan University, Hubei, China. Her research interests are in library management and data sharing. She can be contacted at <email xlink:href="jiangfeng.hu@whu.edu.cn">jiangfeng.hu@whu.edu.cn</email></aff>
</contrib-group>
<pub-date pub-type="epub"><day>06</day><month>05</month><year>2025</year></pub-date>
<pub-date pub-type="collection"><year>2025</year></pub-date>
<volume>30</volume>
<issue>i</issue>
<fpage>982</fpage>
<lpage>991</lpage>
<permissions>
<copyright-year>2025</copyright-year>
<copyright-holder>&#x00A9; 2025 The Author(s).</copyright-holder>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc/4.0/">
<license-p>This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (<ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by-nc/4.0/">http://creativecommons.org/licenses/by-nc/4.0/</ext-link>), permitting all non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<abstract xml:lang="en">
<title>Abstract</title>
<p><bold>Objective.</bold> Under the background of two-way referral in medical consortium, the provision of high-quality hierarchical care requires active integration and cross- organizational sharing of patient data. However, cross-organizational data sharing among hospitals is not always spontaneous, comprehensive, and effective.</p>
<p><bold>Methods.</bold> This paper reports on a research study aiming to identify the barriers of patient data sharing. Due to the exploratory nature of this study, two medical consortiums in central China were chosen to conduct a case study. Specifically, a mixed qualitative-quantitative approach was employed for the case study analysis and verification.</p>
<p><bold>Conclusions.</bold> The analysis of qualitative interview data pointed to 27 barriers of data sharing under three main themes: psychological ownership; territorial behaviours; cross-organizational dynamism. The quantitative Kano analysis revealed the manifestation of these barriers, and their prioritization were classified into four types: must-be, one-dimensional, attractive, and indifference.</p>
<p><bold>Implications.</bold> This study provides valuable references for enhancing the effectiveness of patient data sharing and optimizing the allocation of healthcare resources. The case setting is based on China&#x2019;s medical consortium, but the findings offer useful insights and indications that can be shared across international borders. </p>
</abstract>
</article-meta>
</front>
<body>
<sec id="sec1">
<title>Introduction</title>
<p>Data, commonly understood as statistical observations or collected evidence (<xref rid="R20" ref-type="bibr">Zins, 2007</xref>), has become a crucial asset in modern societies (<xref rid="R6" ref-type="bibr">Hilbert, 2016</xref>). However, data is often only used to a limited extent or frequently only in an internal organization context (<xref rid="R14" ref-type="bibr">Prajogo et al., 2018</xref>). Data sharing refers to breaking down the data barriers between organizational departments, establishing a unified data sharing mechanism, and accelerating the flow of data resources within the organization (<xref rid="R5" ref-type="bibr">Harris et al., 2007</xref>). It also encompasses making research data publicly available with minimal reuse restrictions, known as open data (<xref rid="R17" ref-type="bibr">Thoegersen &#x0026; Borlund, 2022</xref>). While data sharing increases the complexity and quantity of data (<xref rid="R10" ref-type="bibr">Kowalczyk &#x0026; Shankar, 2011</xref>), it plays a vital role in advancing scientific collaboration (<xref rid="R15" ref-type="bibr">Priego et al., 2022</xref>), urban governance (<xref rid="R13" ref-type="bibr">Palm et al., 2019</xref>), public health management (<xref rid="R2" ref-type="bibr">Brand et al., 2022</xref>), and social development.</p>
<p>The hospitals are typically data-intensive organizations. Health decision making has become increasingly complex, and the use of patient data has become essential in this information age (Van, 2014). Integration of patient data has been perceived to be a breakthrough for the discovery of timely, cost-efficiency therapies, and a crucial step towards enhancing the quality of medical care for curing diseases (<xref rid="R18" ref-type="bibr">Weitzman et al., 2010</xref>). Two-way referral serves as a classic example of patient data sharing. It refers to the transfer process between hospitals of different levels, specialized hospitals, or between general and specialized hospitals (<xref rid="R8" ref-type="bibr">Huang et al., 2023</xref>) based on the health needs of the population. Nowadays, the integration and cross-organizational sharing of patient data has become a key part of achieving the goals of hierarchical diagnosis and two-way referral.</p>
<p>Recognizing the importance of addressing these medical needs and challenges, the Chinese government attempted to improve medical development through the establishment of medical consortium (<xref rid="R11" ref-type="bibr">Li et al., 2017</xref>). Medical consortium includes urban medical groups led by tertiary public hospitals, county medical communities led by county hospitals, and specialist alliances and telemedicine collaboration networks with specialist associations as the link (<xref rid="R4" ref-type="bibr">Cai et al., 2018</xref>).</p>
<p>Nevertheless, barriers exist to integrated working, including technical and ethical issues, organizational resistance, financial costs, and privacy concerns (<xref rid="R7" ref-type="bibr">Houtkoop et al., 2018</xref>; <xref rid="R12" ref-type="bibr">Li &#x0026; Cong, 2024</xref>; <xref rid="R16" ref-type="bibr">Reddy et al., 2024</xref>). Meanwhile, different hospitals have different regulations and willingness on sharing patient data in the two-way referral process, which has made the implementation of hierarchical diagnosis and treatment less effective than expected. Yet current research in this field is notably limited.</p>
<p>The paper reports on a research project that aimed to identify and solve existing barriers to cross- organizational sharing of patient data in the context of two-way referral in medical consortium. To further the analysis, the following research questions were formulated:</p>
<p>RQ1. What are the barriers of patient data sharing?</p>
<p>RQ2. Which are the priorities of these barriers?</p>
<p>RQ3. What are the practical strategies to address these barriers?</p>
</sec>
<sec id="sec2">
<title>Research methodology and design</title>
<p>To answer our research questions, and considering the exploratory nature of this study, a case study approach is employed. According to China&#x2019;s current &#x2018;<italic>Hospital Classification and Management Measures</italic>&#x2019;, 3A hospitals are the highest level in the classification of hospitals in Mainland China. After careful consideration, Xiangyang First People&#x2019;s Hospital Medical Consortium and Xiangyang Traditional Chinese Medicine Hospital Medical Consortium is adopted as the research case. Both hospitals are Grade 3A hospitals, which ensures the representativeness of the research and can accurately reflect the situation in the entire medical field.</p>
<p>The research was carried out in two stages. In <italic>stage one</italic>, qualitative research was undertaken to identify the barriers of patient data sharing. Semi-structured interviews were used to gather qualitative data, with guaranteed access to interview respondents. All interviews were recorded using a digital recorder and transcribed verbatim into MS Word files. NVivo 14 was used to facilitate the analysis of interview data.</p>
<p>After that, a Kano model analysis was carried out in <italic>stage two</italic> to verify and validate the barriers identified in the qualitative study. In this stage, Kano model analysis was used to prioritize barriers of patient data sharing. It was expected that through the prioritization processed, effective strategic suggestions could be formulated.</p>
<sec id="sec2_1">
<title>Stage one: qualitative research</title>
<sec id="sec2_1_1">
<title>Research methods and processes</title>
<p>As discussed previously, semi-structured interviews were used to collect qualitative data, which were then analysed using a thematic analysis approach. A framework proposed by Brown et al. (<xref rid="R3" ref-type="bibr">2014</xref>) was used as a basis for data collection and analysis, as shown in <xref ref-type="fig" rid="F1">Figure 1</xref>. The framework comprises three categories which are psychological ownership, territorial behaviours, and cross- organizational dynamism (<xref rid="R3" ref-type="bibr">Brown et al., 2014</xref>), that can help understanding barriers in patient data sharing.</p>
<list list-type="bullet">
<list-item><p>Psychological ownership: hospitals have invested a lot of manpower, material resources and time costs to maintain patient data, so that they have regarded patient data as their inseparable assets.</p></list-item>
<list-item><p>Territorial behaviours: are actions can be adopted by hospitals for the protection of their perceived ownership over data. Hospitals are inclined to keep and safeguard their data instead of sharing it willingly.</p></list-item>
<list-item><p>Cross-organizational dynamism: can moderate the influence of psychological ownership on territorial behaviours.</p></list-item>
</list>
<fig id="F1">
<label>Figure 1.</label>
<caption><p>A preliminary analytical model based on the research of Brown et al. (<xref rid="R3" ref-type="bibr">2014</xref>)</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="images\c82-fig1.jpg"><alt-text>none</alt-text></graphic>
</fig>
<p>The semi-structured question script was designed based on <xref ref-type="fig" rid="F1">Figure 1</xref> and consisted of 15 questions, including 1 ice-breaking question and 14 theoretical probing questions. Before entering the case study, the question script was proofread and trialled with two professors in the field of cross- organizational data sharing. A total of 13 staff and patients were approached and interviewed. The demographic profile of the participants is illustrated in the <xref ref-type="table" rid="T1">Table 1</xref> below: </p>
<table-wrap id="T1">
<label>Table 1.</label>
<caption><p>Information on interview participants</p></caption>
<table>
<thead>
<tr>
<th align="center" valign="top"><bold>No.</bold></th>
<th align="center" valign="top"><bold>Interviewer</bold></th>
<th align="center" valign="top"><bold>Department/Section</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top">A</td>
<td align="center" valign="top">Engineer</td>
<td align="center" valign="top">Information Center</td>
</tr>
<tr>
<td align="center" valign="top">B</td>
<td align="center" valign="top">Engineer</td>
<td align="center" valign="top">Information Center</td>
</tr>
<tr>
<td align="center" valign="top">C</td>
<td align="center" valign="top">Department Leader</td>
<td align="center" valign="top">Information Center</td>
</tr>
<tr>
<td align="center" valign="top">D</td>
<td align="center" valign="top">Clerk</td>
<td align="center" valign="top">Medical Office</td>
</tr>
<tr>
<td align="center" valign="top">E</td>
<td align="center" valign="top">Clerk</td>
<td align="center" valign="top">Medical Office</td>
</tr>
<tr>
<td align="center" valign="top">F</td>
<td align="center" valign="top">Department Leader</td>
<td align="center" valign="top">Information Center</td>
</tr>
<tr>
<td align="center" valign="top">G</td>
<td align="center" valign="top">Engineer</td>
<td align="center" valign="top">Information Center</td>
</tr>
<tr>
<td align="center" valign="top">H</td>
<td align="center" valign="top">Department Leader</td>
<td align="center" valign="top">Medical Office</td>
</tr>
<tr>
<td align="center" valign="top">I</td>
<td align="center" valign="top">Head Nurse</td>
<td align="center" valign="top">Nephrology</td>
</tr>
<tr>
<td align="center" valign="top">J</td>
<td align="center" valign="top">Nurse</td>
<td align="center" valign="top">Nephrology</td>
</tr>
<tr>
<td align="center" valign="top">K</td>
<td align="center" valign="top">Chief Physician</td>
<td align="center" valign="top">Nephrology</td>
</tr>
<tr>
<td align="center" valign="top">L</td>
<td align="center" valign="top">Referral patient</td>
<td align="center" valign="top">Orthopedics</td>
</tr>
<tr>
<td align="center" valign="top">M</td>
<td align="center" valign="top">Referral patient</td>
<td align="center" valign="top">Neurosurgery</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>All interviews were interviewed in March 2024. At the beginning of every interview, the participant was consulted if the use of digital recorder could be accepted. The participants were assured that they can stop the recorder whenever they feel uncomfortable.</p>
<p>Instead of directly diving into the question-answer dialogue, the interviews started by making some irrelevant and light conversations. After obtaining informed consent, all interview recordings were then transcribed verbatim by the research team. The transcripts were analysed using a thematic analysis approach.</p>
<p>In the research, the Brown et al. (<xref rid="R3" ref-type="bibr">2014</xref>)&#x2019;s framework was considered as generic requirements and were converted into a preliminary set of codes in the early stages. Throughout the data analysis, these codes were reconceptualized, expanded and revised, according to the statements, interpretations, and perspectives of the individual interview participants.</p>
</sec>
<sec id="sec2_1_2">
<title>Findings</title>
<p>The analysis of the interview data inherited the thematic analysis strategy of the model (<xref ref-type="fig" rid="F1">Figure 1</xref>), the themes and codes resulting from the analysis are shown in the <xref ref-type="table" rid="T2">Table 2</xref>.</p>
<table-wrap id="T2">
<label>Table 2.</label>
<caption><p>Requirements, themes, coding, and identifier</p></caption>
<table>
<thead>
<tr>
<th align="center" valign="top"><bold>Theme</bold></th>
<th align="center" valign="top"><bold>Sub-theme</bold></th>
<th align="center" valign="top"><bold>Coding</bold></th>
<th align="center" valign="top"><bold>Identifier</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top" rowspan="3">Psychological Ownership</td>
<td align="center" valign="top" rowspan="3">-</td>
<td align="center" valign="top">Fear of declining status after sharing</td>
<td align="center" valign="top">A1</td>
</tr>
<tr>
<td align="center" valign="top">Reluctance to give up data assets</td>
<td align="center" valign="top">A2</td>
</tr>
<tr>
<td align="center" valign="top">Lack of access to required data</td>
<td align="center" valign="top">A3</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="9">Territorial Behaviours</td>
<td align="center" valign="top" rowspan="2">Identity-Oriented Marking</td>
<td align="center" valign="top">Using different data systems</td>
<td align="center" valign="top">B1</td>
</tr>
<tr>
<td align="center" valign="top">Different data processing standards</td>
<td align="center" valign="top">B2</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="2">Control-Oriented Marking</td>
<td align="center" valign="top">Complex approval process for declarations</td>
<td align="center" valign="top">C1</td>
</tr>
<tr>
<td align="center" valign="top">Self-determination of the form of sharing</td>
<td align="center" valign="top">C2</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="4">Anticipatory Defences</td>
<td align="center" valign="top">Distrust of shared patient data</td>
<td align="center" valign="top">D1</td>
</tr>
<tr>
<td align="center" valign="top">Passive response to data sharing construction</td>
<td align="center" valign="top">D2</td>
</tr>
<tr>
<td align="center" valign="top">Insufficient resources in primary medical institutions</td>
<td align="center" valign="top">D3</td>
</tr>
<tr>
<td align="center" valign="top">Lack of personnel in data sharing positions</td>
<td align="center" valign="top">D4</td>
</tr>
<tr>
<td align="center" valign="top">Reactionary Defences</td>
<td align="center" valign="top">Excessive accountability for data accidents</td>
<td align="center" valign="top">E1</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="15">Cross-Organizational Dynamism</td>
<td align="center" valign="top" rowspan="4">Cross-Organizational Management</td>
<td align="center" valign="top">Deviation between government planning and real needs</td>
<td align="center" valign="top">F1</td>
</tr>
<tr>
<td align="center" valign="top">Lack of clear policies and regulations</td>
<td align="center" valign="top">F2</td>
</tr>
<tr>
<td align="center" valign="top">Lack of government supervision and guidance</td>
<td align="center" valign="top">F3</td>
</tr>
<tr>
<td align="center" valign="top">Limited results of medical insurance reform</td>
<td align="center" valign="top">F4</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="5">Cross-Organizational Relationships</td>
<td align="center" valign="top">Lack of high-level cross-organizational mechanism</td>
<td align="center" valign="top">G1</td>
</tr>
<tr>
<td align="center" valign="top">Lack of preliminary cooperation foundation</td>
<td align="center" valign="top">G2</td>
</tr>
<tr>
<td align="center" valign="top">Lack of trust between organizations</td>
<td align="center" valign="top">G3</td>
</tr>
<tr>
<td align="center" valign="top">Interest game of tertiary hospitals</td>
<td align="center" valign="top">G4</td>
</tr>
<tr>
<td align="center" valign="top">Loose cooperation of medical consortium</td>
<td align="center" valign="top">G5</td>
</tr>
<tr>
<td align="center" valign="top" rowspan="6">Cross-Organizational Risk</td>
<td align="center" valign="top">Unclear rights and responsibilities for sharing</td>
<td align="center" valign="top">H1</td>
</tr>
<tr>
<td align="center" valign="top">Lack of incentive and compensation mechanism after sharing</td>
<td align="center" valign="top">H2</td>
</tr>
<tr>
<td align="center" valign="top">Low level of informatization of medical institutions</td>
<td align="center" valign="top">H3</td>
</tr>
<tr>
<td align="center" valign="top">Lack of financial support</td>
<td align="center" valign="top">H4</td>
</tr>
<tr>
<td align="center" valign="top">Concerns about data quality</td>
<td align="center" valign="top">H5</td>
</tr>
<tr>
<td align="center" valign="top">Concerns about data security</td>
<td align="center" valign="top">H6</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The data analysis shows that the interviewees frequently highlighted psychological barriers related to the perceived ownership of data assets. A significant challenge for hospitals is the fear of diminished status after data sharing. This concern is particularly pronounced among community and secondary hospitals, as an interviewee noted, <italic>&#x2018;liberalising data sharing will enable doctors at the next level of care to improve their standards, which poses a threat to us&#x2019;</italic> (Interview F). Besides, in the context of big data, <italic>&#x2018;data are considered assets&#x2019;</italic> (Interview A). Hospitals invest considerable resources, including manpower, material, and time, into maintaining patient data, treating it as a crucial and inseparable asset. As a result, they are unwilling to engage with or learn how to use data-sharing platforms, which further complicates their ability to access data through these platforms.</p>
<p>The data analysis showed that territorial behaviours can significantly affect patient data sharing, with four specific manifestations identified. Identity-oriented marking refers to the fact that <italic>&#x2018;each</italic></p>
<p><italic>hospital has its own HIS system&#x2019;</italic> (Interviewee B), enhancing the complication of integrating systems to achieve data sharing. Besides, <italic>&#x2018;data processing standards&#x2019;</italic> (Interviewee A) varies, with no unified stipulation to realize data cross-authentication. Control-oriented marking is evident in the lengthy approval processes of data sharing request, with <italic>&#x2018;several people need to sign only a piece of file and taking at least three working days to approve it&#x2019;</italic> (Interview M). Anticipatory defences especially reflect a passive response and prudent attitude to obtained data. Meanwhile, deliberate procrastination can also be a common action to defend settled data sharing request, since <italic>&#x2018;they even do not arrange people to specifically designated to handle this issue&#x2019;</italic> (Interview E). Reactionary defences generally occur when hospitals actually experience data infringement by others. There is evidence showing that an excessive accountability for data accidents will be taken as a defensive action to the specific hospital. As a doctor stated that <italic>&#x2018;if they fail to take the necessary security measures and cause a data breach, they must take the responsibility&#x2019;</italic> (Interview L).</p>
<p>Furthermore, the interviews revealed significant barriers to cross-organizational data sharing, primarily related to management, relationships, and risk. The most important barrier for management issue is the current legal framework lacks clarity, as noted by an interviewee, <italic>&#x2018;the overall plan does not conform to the actual situation&#x2019;</italic> (Interview G). To enable effective data sharing management, a unified data centre is essential. However, the absence of a high-level cross- organizational mechanism exacerbates this problem. In terms of relationships, hospitals express concerns about <italic>&#x2018;data security&#x2019;</italic> (Interview B/C/J) and <italic>&#x2018;data quality&#x2019;</italic> (Interview H/I/J), which affect the trust and collaboration for data sharing. Additionally, issues following data sharing include <italic>&#x2018;unclear sharing rights and responsibilities&#x2019;</italic> (Interview F) and an <italic>&#x2018;absence of an incentive compensation mechanism&#x2019;</italic> (Interview A). These risks highlight the need for clearer guidelines and effective incentives.</p>
</sec>
</sec>
<sec id="sec2_2">
<title>Stage two: Kano model analysis</title>
<sec id="sec2_2_1">
<title>Research methods and processes</title>
<p>Kano model is composed of two important concepts, one is the objective realization of requirements, the other is the subjective satisfaction of users. <italic>Stage two</italic> employs the Kano model to validate and verify the barriers identified in <italic>stage one</italic>. Moreover, <italic>stage two</italic> measures the priority of the barriers and classifies the barriers into four categories (sorted in the order they should be solved): Must-be (M); One-dimensional (O); Attractive (A); Indifferent (I) (<xref rid="R19" ref-type="bibr">Xu et al., 2009</xref>). Data collection is divided into three main steps.</p>
<list list-type="bullet">
<list-item><p>Questionnaire design. This study transforms the identified disorders into demand items. Excerpts from the interview transcripts from Stage One were used as evidence for the design of questionnaire.</p></list-item>
<list-item><p>Grading of questions. Every option setting refers to the Likert 5-point scale method (<xref rid="R1" ref-type="bibr">Adelson &#x0026; McCoach, 2010</xref>). And respondents can choose from one of the following five indicators: I like it that way, it must be that way, I am neutral, I can live with it that way, and I dislike it that way.</p></list-item>
<list-item><p>Questionnaire distribution. This study uses both online and offline methods to place and collect questionnaires. The questionnaires were distributed and returned in April 2024, yielding 98 valid responses.</p></list-item>
</list>
</sec>
<sec id="sec2_2_2">
<title>Findings</title>
<p>Defining primary quality attribute (PQA) was the first step in Kano model analysis. In the analysis, responses from the questionnaire survey to the functional and non-functional questions of the requirements were combined and then assigned to a Kano evaluation matrix (<xref ref-type="table" rid="T3">Table 3</xref>). Using the matrix, a requirement can be defined and categorized into one of the M, O, A, I, R and Q categories. For instance, the analysis of requirements B1 is shown in <xref ref-type="table" rid="T4">Table 4</xref>. B1 is an A requirement because A represents the highest ratio. Repeating the above analysis processes, all requirements could be calculated.</p>
<table-wrap id="T3">
<label>Table 3.</label>
<caption><p>Kano evaluation matrix</p></caption>
<table>
<thead>
<tr>
<th align="center" valign="top" colspan="2"><bold>Requirements</bold></th>
<th align="center" valign="top" colspan="5"><bold>Non-functional issues</bold></th>
</tr>
<tr>
<th align="center" valign="top"></th>
<th align="center" valign="top">Scale</th>
<th align="center" valign="top">I dislike it that way</th>
<th align="center" valign="top">I can live with it that way</th>
<th align="center" valign="top">I am neutral</th>
<th align="center" valign="top">It must be that way</th>
<th align="center" valign="top">I like it that way</th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top" rowspan="5">Functional questions</td>
<td align="center" valign="top">I dislike it that way</td>
<td align="center" valign="top"><sup>Q</sup></td>
<td align="center" valign="top">R</td>
<td align="center" valign="top">R</td>
<td align="center" valign="top">R</td>
<td align="center" valign="top">R</td>
</tr>
<tr>
<td align="center" valign="top">I can live with it that way</td>
<td align="center" valign="top">M</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">R</td>
</tr>
<tr>
<td align="center" valign="top">I am neutral</td>
<td align="center" valign="top">M</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">R</td>
</tr>
<tr>
<td align="center" valign="top">It must be that way</td>
<td align="center" valign="top">M</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">I</td>
<td align="center" valign="top">R</td>
</tr>
<tr>
<td align="center" valign="top">I like it that way</td>
<td align="center" valign="top">O</td>
<td align="center" valign="top">A</td>
<td align="center" valign="top">A</td>
<td align="center" valign="top">A</td>
<td align="center" valign="top"><sup>Q</sup></td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T4">
<label>Table 4.</label>
<caption><p>A sample of Kano evaluation matrix for B1</p></caption>
<table>
<thead>
<tr>
<th align="center" valign="top"><bold>Requirements</bold></th>
<th align="center" valign="top"><bold>A</bold></th>
<th align="center" valign="top"><bold>O</bold></th>
<th align="center" valign="top"><bold>M</bold></th>
<th align="center" valign="top"><bold>I</bold></th>
<th align="center" valign="top"><bold>R</bold></th>
<th align="center" valign="top"><sup><bold>Q</bold></sup></th>
</tr>
</thead>
<tbody>
<tr>
<td align="center" valign="top">B1</td>
<td align="center" valign="top">48.0%</td>
<td align="center" valign="top">10.2%</td>
<td align="center" valign="top">18.4%</td>
<td align="center" valign="top">23.5%</td>
<td align="center" valign="top">0</td>
<td align="center" valign="top">0</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>User satisfaction coefficient (UCS) measures a situation whereby achieving a requirement of patient data sharing can prevent dissatisfaction. It comprises two indicators: satisfaction index (SI) and dissatisfaction index (DSI).</p>
<disp-formula><label>(1)</label><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block"><mml:mrow><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>A</mml:mi><mml:mo>+</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>A</mml:mi><mml:mo>+</mml:mo><mml:mn>0</mml:mn><mml:mo>+</mml:mo><mml:mi>M</mml:mi><mml:mo>+</mml:mo><mml:mi>I</mml:mi></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<disp-formula><label>(2)</label><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block"><mml:mrow><mml:mi>D</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mfenced><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfenced><mml:mo>&#x00D7;</mml:mo><mml:mfenced><mml:mrow><mml:mn>0</mml:mn><mml:mo>+</mml:mo><mml:mi>M</mml:mi></mml:mrow></mml:mfenced></mml:mrow><mml:mrow><mml:mi>A</mml:mi><mml:mo>+</mml:mo><mml:mn>0</mml:mn><mml:mo>+</mml:mo><mml:mi>M</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>Based on the calculation of SI and DSI, a satisfaction impact matrix can be developed with an X- axis presenting the DSI values and a Y-axis illustrating the SI values.</p>
<disp-formula><label>(3)</label><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block"><mml:mrow><mml:mi>X</mml:mi><mml:mo>=</mml:mo><mml:mi>D</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mfenced><mml:mrow><mml:mi>D</mml:mi><mml:mi>S</mml:mi><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>min</mml:mi><mml:mo>,</mml:mo></mml:mrow></mml:msub><mml:mi>D</mml:mi><mml:mi>S</mml:mi><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfenced><mml:mi>D</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mfenced close="]" open="["><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>0</mml:mn></mml:mrow></mml:mfenced></mml:mrow></mml:math></disp-formula>
<disp-formula><label>(4)</label><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block"><mml:mrow><mml:mi>Y</mml:mi><mml:mo>=</mml:mo><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mfenced><mml:mrow><mml:mi>S</mml:mi><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>min</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:msub><mml:mi>I</mml:mi><mml:mrow><mml:mi>max</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfenced><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mfenced close="]" open="["><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfenced></mml:mrow></mml:math></disp-formula>
<disp-formula><label>(5)</label><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" display="block"><mml:mrow><mml:mn>0</mml:mn><mml:mfenced><mml:mrow><mml:mi>X</mml:mi><mml:mo>,</mml:mo><mml:mi>Y</mml:mi></mml:mrow></mml:mfenced><mml:mo>=</mml:mo><mml:mfenced><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>a</mml:mi><mml:mi>v</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>Y</mml:mi><mml:mrow><mml:mi>a</mml:mi><mml:mi>v</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfenced></mml:mrow></mml:math></disp-formula>
<p>Therefore, the UCS is developed as shown in <xref ref-type="fig" rid="F2">Figure 2</xref>. Moreover, the barriers are divided into four sections: Attractive (A): B1, C1, D4, E1, F2, G2, G4, G5, H4. One-dimensional (O): B2, H2, H6. Must- be (M): A2, A3, D2, F1, G1, H1, H3, H5. Indifferent (I): A1, C2, D1, D3, F3, F4, G3.</p>
<fig id="F2">
<label>Figure 2.</label>
<caption><p>User satisfaction impact matrix</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="images\c82-fig2.jpg"><alt-text>none</alt-text></graphic>
</fig>
</sec>
</sec>
</sec>
<sec id="sec3">
<title>Discussions and conclusions</title>
<p>This paper uses a comprehensive approach to identify barriers to patient data sharing and validate the prioritization of barriers. Using deductive qualitative methods, 27 barriers of data sharing were identified under three main themes. Subsequently, these barriers were categorized into four levels using Kano analysis based on the quantitative measurement. This study generates the following specific strategic suggestions.</p>
<p>First, establishing standardized patient data specifications is a critical prerequisite for effective data sharing. It is recommended to systematically categorize data types, encompassing essential attributes such as format, storage methods, and access rights. A comprehensive and compatible standardization framework should be developed. Based on this, a specialized team should be established to oversee the implementation of these data standards. Additionally, hospitals should prioritize the development of new technologies and increase capital investment to ensure the real-time updating and seamless transmission of critical medical information.</p>
<p>Second, to enhance the diagnostic and therapeutic capabilities of medical consortium, it is crucial to prioritize comprehensive training programs to ensure all employees are equipped with the essential skills and knowledge. This training should focus on fostering a robust understanding of collaboration and resource sharing within the network. As this awareness deepens, employees will gain a deeper understanding of data sharing. This understanding will ultimately foster a cooperative culture, enabling smooth and effective sharing of medical data and resources across organizations.</p>
<p>Third, to address the challenges of financial support and benefit distribution in data sharing, it is imperative to enhance government involvement. Specifically, the government should urgently increase financial support and establish a dedicated subsidy system for patient data sharing. Additionally, a cross-organizational communication framework centered on data sharing should be developed, with a committee comprising hospital representatives overseeing this initiative.</p>
<p>Fourth, for the sake of improving the staff&#x2019;s ability to understand and utilize the medical consortium effectively, hospitals should implement targeted educational activities emphasizing the importance of data quality, including holding lectures, seminars, etc. At the same time, hospitals should collaborate with data experts and software developers to design comprehensive training courses for the medical information system, covering system functions, operating logic, application scenarios, etc.</p>
<p>In conclusion, cross-organizational patient data sharing in medical consortium offers a unique opportunity for hospitals to redefine, reposition and reinvent themselves. This research adds to the general knowledge base by proposing a comprehensive set of barriers of patient data sharing and strategic suggestions, which can be adopted as a knowledge base and a starting point for future studies. Also, future work can aim at expanding the sample coverage and conducting research on different types of medical consortium.</p>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="R1"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Adelson</surname><given-names>J. L.</given-names></name><name><surname>McCoach</surname><given-names>D. B.</given-names></name></person-group><year>2010</year><article-title>Measuring the Mathematical Attitudes of Elementary Students: The Effects of a 4-Point or 5-Point Likert-Type Scale</article-title><source>Educational and Psychological Measurement</source><volume>70</volume><issue>5</issue><fpage>796</fpage><lpage>807</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/0013164410366694">https://doi.org/10.1177/0013164410366694</ext-link></element-citation></ref>
<ref id="R2"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brand</surname><given-names>D.</given-names></name><name><surname>Singh</surname><given-names>J. A.</given-names></name><name><surname>McKay</surname><given-names>A. G. N.</given-names></name><name><surname>Cengiz</surname><given-names>N.</given-names></name><name><surname>Moodley</surname><given-names>K.</given-names></name></person-group><year>2022</year><article-title>Data sharing governance in sub-Saharan Africa during public health emergencies: Gaps and guidance</article-title><source>South African Journal of Science</source><volume>118</volume><fpage>11</fpage><lpage>12</lpage><comment>Article #13892</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17159/sajs.2022/13892">https://doi.org/10.17159/sajs.2022/13892</ext-link></element-citation></ref>
<ref id="R3"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brown</surname><given-names>G.</given-names></name><name><surname>Crossley</surname><given-names>C.</given-names></name><name><surname>Robinson</surname><given-names>S. L.</given-names></name></person-group><year>2014</year><article-title>PSYCHOLOGICAL OWNERSHIP, TERRITORIAL BEHAVIOR, AND BEING PERCEIVED AS A TEAM CONTRIBUTOR: THE CRITICAL ROLE OF TRUST IN THE WORK ENVIRONMENT</article-title><source>Personnel Psychology</source><volume>67</volume><issue>2</issue><fpage>463</fpage><lpage>485</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/peps.12048">https://doi.org/10.1111/peps.12048</ext-link></element-citation></ref>
<ref id="R4"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cai</surname><given-names>M.</given-names></name><name><surname>Liu</surname><given-names>E.</given-names></name><name><surname>Tao</surname><given-names>H. B.</given-names></name><name><surname>Qian</surname><given-names>Z. M.</given-names></name><name><surname>Fu</surname><given-names>Q.</given-names></name><name><surname>Lin</surname><given-names>X. J.</given-names></name><name><surname>Ni</surname><given-names>Z. L.</given-names></name></person-group><year>2018</year><article-title>Does A Medical Consortium Influence Health Outcomes of Hospitalized Cancer Patients? An Integrated Care Model in Shanxi, China</article-title><source>International Journal of Integrated Care</source><volume>18</volume><issue>2</issue><comment>Article 7</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5334/ijic.3588">https://doi.org/10.5334/ijic.3588</ext-link></element-citation></ref>
<ref id="R5"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Harris</surname><given-names>D.</given-names></name><name><surname>Khan</surname><given-names>L.</given-names></name><name><surname>Paul</surname><given-names>R.</given-names></name><name><surname>Thuraisingham</surname><given-names>B.</given-names></name></person-group><year>2007</year><article-title>Standards for secure data sharing across organizations</article-title><source>Computer Standards &#x0026; Interfaces</source><volume>29</volume><issue>1</issue><fpage>86</fpage><lpage>96</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.csi.2006.01.004">https://doi.org/10.1016/j.csi.2006.01.004</ext-link></element-citation></ref>
<ref id="R6"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hilbert</surname><given-names>M.</given-names></name></person-group><year>2016</year><article-title>Big Data for Development: A Review of Promises and Challenges</article-title><source>Development Policy Review</source><volume>34</volume><issue>1</issue><fpage>135</fpage><lpage>174</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/dpr.12142">https://doi.org/10.1111/dpr.12142</ext-link></element-citation></ref>
<ref id="R7"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Houtkoop</surname><given-names>B. L.</given-names></name><name><surname>Chambers</surname><given-names>C.</given-names></name><name><surname>Macleod</surname><given-names>M.</given-names></name><name><surname>Bishop</surname><given-names>D. V. M.</given-names></name><name><surname>Nichols</surname><given-names>T. E.</given-names></name><name><surname>Wagenmakers</surname><given-names>E. J.</given-names></name></person-group><year>2018</year><article-title>Data Sharing in Psychology: A Survey on Barriers and Preconditions</article-title><source>Advances in Methods and Practices in Psychological Science</source><volume>1</volume><issue>1</issue><fpage>70</fpage><lpage>85</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/2515245917751886">https://doi.org/10.1177/2515245917751886</ext-link></element-citation></ref>
<ref id="R8"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>R. L.</given-names></name><name><surname>Wang</surname><given-names>X. K.</given-names></name><name><surname>Hou</surname><given-names>W. H.</given-names></name><name><surname>Chen</surname><given-names>Z. Y.</given-names></name><name><surname>Wang</surname><given-names>Y. T.</given-names></name><name><surname>Wang</surname><given-names>J. Q.</given-names></name></person-group><year>2023</year><article-title>Two-way referral cooperative hospital selection with uncertain information: A two-sided matching decision-making approach</article-title><source>Computers &#x0026; Industrial Engineering</source><volume>183</volume><comment>Article 109430</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.cie.2023.109430">https://doi.org/10.1016/j.cie.2023.109430</ext-link></element-citation></ref>
<ref id="R9"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kass</surname><given-names>N. E.</given-names></name><name><surname>Natowicz</surname><given-names>M. R.</given-names></name><name><surname>Hull</surname><given-names>R. C.</given-names></name><name><surname>Faden</surname><given-names>R. R.</given-names></name><name><surname>Plantinga</surname><given-names>L.</given-names></name><name><surname>Gostin</surname><given-names>L. O.</given-names></name><name><surname>Slutsman</surname><given-names>J.</given-names></name></person-group><year>2003</year><article-title>The use of medical records in research: What do patients want?</article-title> <source>Journal of Law Medicine &#x0026; Ethics</source><volume>31</volume><issue>3</issue><fpage>429</fpage><lpage>433</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1111/j.1748-720X.2003.tb00105.x">https://doi.org/10.1111/j.1748-720X.2003.tb00105.x</ext-link></element-citation></ref>
<ref id="R10"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kowalczyk</surname><given-names>S.</given-names></name><name><surname>Shankar</surname><given-names>K.</given-names></name></person-group><year>2011</year><article-title>Data Sharing in the Sciences</article-title><source>Annual review of information science and technology</source><volume>45</volume><fpage>247</fpage><lpage>294</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/aris.2011.1440450113">https://doi.org/10.1002/aris.2011.1440450113</ext-link></element-citation></ref>
<ref id="R11"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>X.</given-names></name><name><surname>Lu</surname><given-names>J. P.</given-names></name><name><surname>Hu</surname><given-names>S.</given-names></name><name><surname>Cheng</surname><given-names>K. K.</given-names></name><name><surname>De Maeseneer</surname><given-names>J.</given-names></name><name><surname>Meng</surname><given-names>Q. Y.</given-names></name><name><surname>Hu</surname><given-names>S. S.</given-names></name></person-group><year>2017</year><article-title>The primary health-care system in China</article-title><source>Lancet</source><volume>390</volume><issue>10112</issue><fpage>2584</fpage><lpage>2594</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/s0140- 6736(17)33109-4">https://doi.org/10.1016/s0140- 6736(17)33109-4</ext-link></element-citation></ref>
<ref id="R12"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>X. J.</given-names></name><name><surname>Cong</surname><given-names>Y. L.</given-names></name></person-group><year>2024</year><article-title>Exploring barriers and ethical challenges to medical data sharing: perspectives from Chinese researchers</article-title><source>Bmc Medical Ethics</source><volume>25</volume><issue>1</issue><comment>Article 132</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1186/s12910-024-01135-8">https://doi.org/10.1186/s12910-024-01135-8</ext-link></element-citation></ref>
<ref id="R13"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Palm</surname><given-names>J.</given-names></name><name><surname>S&#x00F6;dergren</surname><given-names>K.</given-names></name><name><surname>Bocken</surname><given-names>N.</given-names></name></person-group><year>2019</year><article-title>The Role of Cities in the Sharing Economy: Exploring Modes of Governance in Urban Sharing Practices</article-title><source>Energies</source><volume>12</volume><issue>24</issue><comment>Article 4737</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3390/en12244737">https://doi.org/10.3390/en12244737</ext-link></element-citation></ref>
<ref id="R14"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Prajogo</surname><given-names>D.</given-names></name><name><surname>Toy</surname><given-names>J.</given-names></name><name><surname>Bhattacharya</surname><given-names>A.</given-names></name><name><surname>Oke</surname><given-names>A.</given-names></name><name><surname>Cheng</surname><given-names>T. C. E.</given-names></name></person-group><year>2018</year><article-title>The relationships between information management, process management and operational performance: Internal and external contexts</article-title><source>International Journal of Production Economics</source><volume>199</volume><fpage>95</fpage><lpage>103</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.ijpe.2018.02.019">https://doi.org/10.1016/j.ijpe.2018.02.019</ext-link></element-citation></ref>
<ref id="R15"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Priego</surname><given-names>L. P.</given-names></name><name><surname>Wareham</surname><given-names>J.</given-names></name><name><surname>Romasanta</surname><given-names>A. K. S.</given-names></name></person-group><year>2022</year><article-title>The puzzle of sharing scientific data</article-title><source>Industry and Innovation</source><volume>29</volume><issue>2</issue><fpage>219</fpage><lpage>250</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/13662716.2022.2033178">https://doi.org/10.1080/13662716.2022.2033178</ext-link></element-citation></ref>
<ref id="R16"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Reddy</surname><given-names>R. C.</given-names></name><name><surname>Mishra</surname><given-names>D.</given-names></name><name><surname>Goyal</surname><given-names>D. P.</given-names></name><name><surname>Rana</surname><given-names>N. P.</given-names></name></person-group><year>2024</year><article-title>A conceptual framework of barriers to data science implementation: a practitioners&#x2019; guideline</article-title><source>Benchmarking-an International Journal</source><volume>31</volume><issue>10</issue><fpage>3459</fpage><lpage>3496</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/bij-03-2023-0160">https://doi.org/10.1108/bij-03-2023-0160</ext-link></element-citation></ref>
<ref id="R17"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Thoegersen</surname><given-names>J. L.</given-names></name><name><surname>Borlund</surname><given-names>P.</given-names></name></person-group><year>2022</year><article-title>Researcher attitudes toward data sharing in public data repositories: a meta-evaluation of studies on researcher data sharing</article-title><source>Journal of Documentation</source><volume>78</volume><issue>7</issue><fpage>1</fpage><lpage>17</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/jd-01-2021-0015">https://doi.org/10.1108/jd-01-2021-0015</ext-link></element-citation></ref>
<ref id="R18"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Weitzman</surname><given-names>E. R.</given-names></name><name><surname>Kaci</surname><given-names>L.</given-names></name><name><surname>Mandl</surname><given-names>K. D.</given-names></name></person-group><year>2010</year><article-title>Sharing Medical Data for Health Research: The Early Personal Health Record Experience</article-title><source>Journal of medical Internet research</source><volume>12</volume><issue>2</issue><comment>Article e14</comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2196/jmir.1356">https://doi.org/10.2196/jmir.1356</ext-link></element-citation></ref>
<ref id="R19"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Xu</surname><given-names>Q. L.</given-names></name><name><surname>Jiao</surname><given-names>R. J.</given-names></name><name><surname>Yang</surname><given-names>X.</given-names></name><name><surname>Helander</surname><given-names>M.</given-names></name><name><surname>Khalid</surname><given-names>H. M.</given-names></name><name><surname>Opperud</surname><given-names>A.</given-names></name></person-group><year>2009</year><article-title>An analytical Kano model for customer need analysis</article-title><source>Design Studies</source><volume>30</volume><issue>1</issue><fpage>87</fpage><lpage>110</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1016/j.destud.2008.07.001">https://doi.org/10.1016/j.destud.2008.07.001</ext-link></element-citation></ref>
<ref id="R20"><element-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zins</surname><given-names>C.</given-names></name></person-group><year>2007</year><article-title>Conceptual approaches for defining data, information, and knowledge</article-title><source>Journal of the American society for information science and technology</source><volume>58</volume><issue>4</issue><fpage>479</fpage><lpage>493</lpage><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1002/asi.20508">https://doi.org/10.1002/asi.20508</ext-link></element-citation></ref>
</ref-list>
</back>
</article>